• Title/Summary/Keyword: Event Hooking

Search Result 6, Processing Time 0.029 seconds

Architecture Modeling and Performance Analysis of Event Rule Engine (이벤트 파싱 엔진의 구조 설계와 성능 분석)

  • 윤태웅;민덕기
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.51-57
    • /
    • 2003
  • In operating distributed systems, proactive management is one of the major concerns for better quality of service and future capacity planning. In order to handle this management problem effectively, it is necessary to analyze performances of the distributed system and events generated by components in the system. This paper provides a rule-based event parsing engine for proactive management. Our event parsing engine uses object hooking-based and event-token approaches. The object hooking-based approach prepares new conditions and actions in Java classes and allows dynamically exchange them as hook objects in run time. The event-token approach allows the event parsing engine consider a proper sequence and relationship among events as an event token to trigger an action. We analyze the performance of our event parsing engine with two different implementations of rule structure; one is table-based and the other is tree-based.

  • PDF

A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System

  • Lim, Hyung-Min;Jang, Kun-Won;Kim, Byung-Gi
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.609-620
    • /
    • 2010
  • In order to provide a tailored education for learners within the ubiquitous environment, it is critical to undertake an analysis of the learning activities of learners. For this purpose, SCORM (Sharable Contents Object Reference Model), IMS LD (Instructional Management System Learning Design) and other standards provide learning design support functions, such as, progress checks. However, in order to apply these types of standards, contents packaging is required, and due to the complicated standard dimensions, the facilitation level is lower than the work volume when developing the contents and this requires additional work when revision becomes necessary. In addition, since the learning results are managed by the server there is the problem of the OS being unable to save data when the network is cut off. In this study, a system is realized to manage the actions of learners through the event interception of a web-browser by using event hooking. Through this technique, all HTMLbased contents can be facilitated again without additional work and saving and analysis of learning results are available to improve the problems following the application of standards. Furthermore, the ubiquitous learning environment can be supported by tracking down learning results when the network is cut off.

Design and Implementation of The Ubiquitous Computing Environment-Based on Dynamic Smart on / off-line Learner Tracking System (유비쿼터스 환경 기반의 동적인 스마트 온/오프라인 학습자 추적 시스템 설계 및 구현)

  • Lim, Hyung-Min;Lee, Sang-Hun;Kim, Byung-Gi
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.24-32
    • /
    • 2011
  • In ubiquitous environment, the analysis for student's learning behaviour is essential to provide students with personalized education. SCORM(Sharable Contents Object Reference Model), IMS LD (Instructional Management System Learning Design) standards provide the support function of learning design such as checking the progress. However, in case of applying these standards contain many problem to add or modify the contents. In this paper, We implement the system that manages the learner behaviour by hooking the event of web browser. Through all of this, HTML-based content can be recycled without any additional works and the problems by applying the standard can be improved because the store and analysis of the learning result is possible. It also supports the ubiquitous learning environment because of keeping track of the learning result in case of network disconnected.

A Study on the Serialized Event Sharing System for Multiple Telecomputing User Environments (원격.다원 사용자 환경에서의 순차적 이벤트 공유기에 관한 연구)

  • 유영진;오용선
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.344-350
    • /
    • 2003
  • In this paper, we propose a novel sharing method ordering the events occurring between users collaborated with the common telecomputing environment. We realize the sharing method with multimedia data to improve the coworking effect using teleprocessing network. This sharing method advances the efficiency of communicating projects such as remote education, tele-conference, and co-authoring of multimedia contents by offering conveniences of presentation, group authoring, common management, and transient event productions of the users. As for the conventional sharing white board system, all the multimedia contents segments should be authored by the exclusive program, and we cannot use any existing contents or program. Moreover we suffer from the problem that ordering error occurs in the teleprocessing operation because we do not have any line-up technology for the input ordering of commands. Therefore we develop a method of retrieving input and output events from the windows system and the message hooking technology which transmits between programs in the operating system In addition, we realize the allocation technology of the processing results for all sharing users of the distributed computing environment without any error. Our sharing technology should contribute to improve the face-to-face coworking efficiency for multimedia contents authoring, common blackboard system in the area of remote educations, and presentation display in visual conference.

  • PDF

Late Comer and Error Recovery Process for Home Network Environment with Session Management (세션 관리 기능을 포함한 홈 네트워크 환경에서의 지각자 및 오류 복구 처리)

  • Kim, Hak-Joon;Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.666-672
    • /
    • 2008
  • This paper explains late comer and error recovery process for home network environment with session management. This system consists of an ED, ES, and ER. ED is an agent that detects an error by hooking techniques for multimedia distance education based on home network environment with session management. ES is an agent that is an error sharing system for multimedia distance education based on home network environment with session management. ER is a system that is suitable for recovering software error for multimedia distance education based on home network environment with session management. This paper explains a performance analysis of an error recovery system running on distributed multimedia environment using the rule-based DEVS modeling and simulation techniques. The proposed method is more efficient than the other method in comparison with error ration and processing time.

  • PDF

Analysis of the Password Leaking in Virtual Keyboard (가상키보드 비밀번호 유출 분석)

  • Yang, Hee-dong;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.827-835
    • /
    • 2022
  • In order to use online financial services, user authentication technology is necessary. Password check through keyboard typing is the most common technique. However, since it became known that key stokes on the keyboard can be intercepted easily, many Internet banking services and easy payment services have adopted the virtual keyboard. However, contrary to the expectation that the virtual keyboard will be safe, there is a risk that key strokes on the virtual keyboard can be leaked. In this paper, we analyzed the possibility of password leaking on the virtual keyboard and presented a password leaking method using mouse event hooking and screen capture in PC operating system. In addition, we inspected the possibility of password leak attacks on several famous Korea Internet banking websites and simple payment services, and as a result, we verified that the password input method through the virtual keyboard in the PC operating system is not secure.